Research Article
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Figure 11
Sensitivity analysis. (a) Decrypted image by correct key. (b) Decrypted image by . (c) Decrypted image by . (d) Decrypted image by . (e) Decrypted image by . (f) Decrypted image by .
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |